Demostraciones / Vídeos

Demostraciones

A core element of any cloud security strategy is the enforcement of acceptable usage policies. See how McAfee Web Protection provides system and network administrators with more than 1,000 application controls to manage user’s access to specific cloud application functions, such as Facebook or YouTube.

In order to share sensitive or proprietary information on the web without compromising security, you need to prevent bad actors from being able to download or read files. See how the built-in encryption technology of McAfee Web Protection automatically protects files uploaded to popular cloud-based collaboration sites.

McAfee Content Security Reporter delivers unified and detailed insight across threat vectors and malicious content that targets organizations via the network, email, and the web. A rich and flexible range of tools enables administrators to understand threats and trends and match this insight with action.

Vídeos

Many enterprises prefer to consolidate network security functions onto as few platforms as possible. In this video, Jon Oltsik, a top security analyst at Enterprise Strategy Group, discusses some of the considerations that CIOs and CSOs need to take into account when considering whether to deploy a stand-alone next-generation firewall or a secure web gateway to protect internal IT assets. Not surprisingly, his answer is, “It depends…”.

McAfee Web Protection is the industry’s most flexible secure web gateway solution. Customers can deploy any way they want – on-premises, in the cloud, or both – with the flexibility to adapt as business circumstances change. All it takes is one mouse click to synchronize security policy rules, enabling you to protect all users against web-based threats, regardless of location or device.

Web-based malware can be downloaded from external sites by users, or uploaded to internal systems if you provide access to external users, such as partners or contractors. This data sheet explains how the reverse proxy and Internet Content Adaptation Protocol (ICAP) features in McAfee Web Gateway enhance network security and block malware targeted at internal websites.

Libros blancos

This white paper discusses the flagship McAfee Gateway Anti-Malware technology, how it adapts to new threats, and sets the stage to protect against future threats with a modular design that allows for the easy addition of components for maximum flexibility.

How can you protect your employees’ computers against malware attack regardless of their location? How can you enforce acceptable usage policies for employees located remotely or mobile? The best way to protect against web threats is to redirect all web traffic through a proxy or web gateway that can block blacklisted or unsuitable sites, filter malware downloads, and enforce rules preventing sensitive data from being lost. In this white paper, Osterman Research describes the four ways to reroute web traffic from a mobile device or remote computer through a gateway, and highlights the strengths and weaknesses of each approach.

Secure web gateways are essential in today’s connected world, but which proxy configuration should you choose: direct or transparent? This white paper guides you through the pros and cons and makes recommendations that will help you secure your company and your users more effectively.

This paper will explore ways to implement web filtering of mobile devices through McAfee Web Gateway and discuss
ways that McAfee Enterprise Mobility Management (McAfee EMM) software can be leveraged in an integrated manner
to assist with web filtering.

This paper characterizes new web threats, explains why most security solutions in place today are ineffective, and then proposes three key organizational principles for assessing and enhancing web security—security, control, and flexibility—and nine functional requirements that enable these principles.

Preguntas frecuentes

Reportes

AV-TEST performed a comparative review of McAfee Web Protection in the Cloud and Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine their performance against the latest threats on the web.

Social networks, cloud applications, and content-sharing sites have become essential business tools and IT organizations are struggling to make them safely accessible from inside and outside the corporate environment. Read this Solution Brief and see how McAfee Threat Defense for McAfee Web Gateway helps overcome the obstacles.

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

This Osterman Research Executive Brief summarizes a webcast that outlined issues created by the rapid adoption of cloud-based applications. The brief also includes recommendations and questions organizations should address about the use of cloud-based applications in order to maintain access control and to protect sensitive data assets.

Learn how the McAfee Hybrid Service Delivery Architecture provides a blueprint for adopting any or all service delivery platforms — integrated appliances, virtual appliances, or hosted services—without scrimping on deployment flexibility, security, or savings.

Comunidad

Blogs

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Cyber-criminals are the Hyenas of the Digital Ecosystem (my sincerest apologies to hyenas). Cyber-criminals […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Coffee, Cocaine, and SSL Attacks. Today’s cybercriminals have borrowed a tried and true technique […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Breaking Bad Code: Exposing the Walter White of Attack Methods The popular crime […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. No Smoke. No Mirrors. No Misdirection: Evasive Thieves Attack with Houdini-like Prowess. Cyber-thieves […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Employees Are So Helpful—Just Ask any Hacker. Everyone must choose their battles. Take […]